Real Estate:  How to Manage Cybersecurity Risk in Smart Buildings

Credit to Author: Annick Villeneuve| Date: Tue, 07 May 2019 20:34:08 +0000

Cybersecurity in smart buildings There is no question, smart buildings are becoming more commonplace in today’s real estate portfolios, and cybersecurity is a critical consideration.  In an in-depth, 2 part… Read more »

The post Real Estate:  How to Manage Cybersecurity Risk in Smart Buildings appeared first on Schneider Electric Blog.

Read more

Cybersecurity Leaders Are Talking A Lot About Counterfeit Devices

Credit to Author: Greg Young (Vice President for Cybersecurity)| Date: Tue, 07 May 2019 13:00:28 +0000

Malice Vs Greed Most discussion about security in the supply chain has been focused on detecting tampering, or preventing backdoors or sneaky things being inserted into components and software. There’s another aspect emerging and will dwarf the tampering: devices that are counterfeited for profit indirectly causing security problems. Counterfeit devices are ones that either by…

The post Cybersecurity Leaders Are Talking A Lot About Counterfeit Devices appeared first on .

Read more

This Week in Security News: 5G Security and Tax Scams

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 12 Apr 2019 14:00:11 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about cybersecurity and data concerns in 5G. Also, learn about cybercriminal threats during tax season. Read on: Securing Enterprises for 5G Connectivity For the advantages of…

The post This Week in Security News: 5G Security and Tax Scams appeared first on .

Read more

Introducing the security configuration framework: A prioritized guide to hardening Windows 10

Credit to Author: Eric Avena| Date: Thu, 11 Apr 2019 15:00:41 +0000

The security configuration framework is designed to help simplify security configuration while still allowing enough flexibility to allow you to balance security, productivity, and user experience. We are defining discrete prescriptive Windows 10 security configurations (levels 5 through 1) to meet many of the common device scenarios we see today in the enterprise.

The post Introducing the security configuration framework: A prioritized guide to hardening Windows 10 appeared first on Microsoft Security.

Read more

Analysis of a targeted attack exploiting the WinRar CVE-2018-20250 vulnerability

Credit to Author: Eric Avena| Date: Wed, 10 Apr 2019 15:00:58 +0000

A complex attack chain incorporating the CVE-2018-20250 exploit and multiple code execution techniques attempted to run a fileless PowerShell backdoor that could allow an adversary to take full control of compromised machines.

The post Analysis of a targeted attack exploiting the WinRar CVE-2018-20250 vulnerability appeared first on Microsoft Security.

Read more

Steer clear of tax scams

Credit to Author: Eric Avena| Date: Fri, 05 Apr 2019 16:00:13 +0000

In the month of February, we saw an average of 300,000 phishing attempts across Microsoft’s browsing platforms daily. Our security experts expect these attempted scams to become increasingly more prevalent through the April 15 tax day.

The post Steer clear of tax scams appeared first on Microsoft Security.

Read more

From alert to driver vulnerability: Microsoft Defender ATP investigation unearths privilege escalation flaw

Credit to Author: Eric Avena| Date: Mon, 25 Mar 2019 15:00:07 +0000

Our discovery of two privilege escalation vulnerabilities in a driver highlights the strength of Microsoft Defender ATP’s sensors. These sensors expose anomalous behavior and give SecOps personnel the intelligence and tools to investigate threats, as we did.

The post From alert to driver vulnerability: Microsoft Defender ATP investigation unearths privilege escalation flaw appeared first on Microsoft Security.

Read more

5 steps financial institutions can take to reduce their cybercrime risk

Credit to Author: Todd VanderArk| Date: Mon, 18 Mar 2019 16:00:17 +0000

Increasingly financial institutions are concerned about their cybersecurity risk. Here are five recommendations can help them more effectively manage that risk.

The post 5 steps financial institutions can take to reduce their cybercrime risk appeared first on Microsoft Security.

Read more

The Familial Relationship Between Cybersecurity and Safety

Credit to Author: Jay Abdallah| Date: Mon, 25 Mar 2019 15:14:09 +0000

For many of us, our older siblings are our earliest mentors.  That’s because they frequently pass – directly or indirectly – their life lessons down to us. We benefit because,… Read more »

The post The Familial Relationship Between Cybersecurity and Safety appeared first on Schneider Electric Blog.

Read more